
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-39292 affects Slack Morphism, a modern client library for Slack Web/Events API/Socket Mode and Block Kit. The vulnerability was discovered and disclosed in October 2022, where debug logs were found to expose sensitive URLs for Slack webhooks containing private information (NVD).
The vulnerability stems from insufficient protection of sensitive information in debug logs, where Slack webhook URLs containing private information were being exposed in plain text. This issue affects versions of Slack Morphism prior to and including version 1.3.0 (GitHub Advisory).
The exposure of sensitive Slack webhook URLs in debug logs could potentially allow unauthorized access to private information and potentially lead to unauthorized webhook usage. This could compromise the security and privacy of Slack communications and integrations (GitHub Advisory).
The vulnerability has been patched in version 1.3.2 of Slack Morphism, which implements redaction of sensitive URLs for webhooks. For users unable to upgrade immediately, a workaround is available by disabling or filtering debug logs when using Slack webhooks through tracing log level and filters (GitHub Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."